Call for Abstract
Cloud Computing and Virtualization, will be organized around the theme “Cloud computing is the third wave of the digital revolution.”
Cloud Computing 2020 is comprised of keynote and speakers sessions on latest cutting edge research designed to offer comprehensive global discussions that address current issues in Cloud Computing 2020
Submit your abstract to any of the mentioned tracks.
Register now for the conference by choosing an appropriate package suitable to you.
Mobile cloud computing is next generation of cloud computing making it available for every mobile user. This helps to access large data which is available in cloud. So much of research is going on this mobile cloud regarding its efficiency, adaptability, ease of understanding and security for the data and over the cloud.
- Track 1-1Design of energy-saving mobile cloud protocols
- Track 1-2Mobile cloud architectures and models
- Track 1-3Mobile cloud networking
- Track 1-4Mobile and wearable computing systems and services
- Track 1-5Mobile and energy-efficient use of clouds
- Track 1-6Mobile Commerce, Handheld Commerce and e-markets on Cloud
\r\n A multi-tenant cloud is a cloud computing architecture that allows customers to share computing resources in a public or private cloud. Each tenant's data is isolated and remains invisible to other tenants. In a multi-tenant cloud system, users have individualized space for storing their projects and data. Each section of a cloud network with multi-tenant architecture includes complex permissions with the intention of allowing each user access to only their stored information along with security from other cloud tenants. Within the cloud infrastructure, each tenant's data is inaccessible to all other tenants, and can only be reached with the cloud provider's permissions. In a private cloud, the customers, or tenants, may be different individuals or groups within a single company, while in a public cloud, entirely different organizations may safely share their server space. Most public cloud providers use the multi-tenancy model. It allows them to run servers with single instances, which is less expensive and helps to streamline updates.\r\n
- Track 2-1How multi-tenant cloud works?
- Track 2-2Multi-tenant cloud vs single-tenant cloud
- Track 2-3Benefits of multi-tenant cloud
- Track 2-4Live Examples of multi-tenancy
- Track 3-1What is the difference between recovery and backup?
- Track 3-2What is cloud data backup?
- Track 3-3What is importance of data backup and recovery?
- Track 3-4What are the best cloud backup services?
- Track 3-5What is the use of backup and restore?
- Track 3-6How does backup and restore work?
\r\n Cryptography in the cloud employs encryption techniques to secure data that will be used or stored in the cloud. It allows users to conveniently and securely access shared cloud services, as any data that is hosted by cloud providers is protected with encryption. Cryptography in the cloud protects sensitive data without delaying information exchange. Crypto cloud computing is a new[neutrality is disputed] secure cloud computing architecture. Cloud computing is a large-scale distributed computing model that is driven by economies of scale. It integrates a set of abstracted, virtualized, dynamically-scalable, and managed resources, such as computing power, storage, platforms, and services. External users can access to resources over the Internet using terminals, especially mobile terminals. Cloud architectures are developed in on-demand fashion. That is, the resources are dynamically assigned to a user according to his request, and relinquished after the job is done Cloud computing is a pool of services including the hardware and operating system infrastructure, the formation of systems management software, system and platform, and virtualization components. According to the level of its resources, cloud computing services can be divided into three categories, Infrastructure as a service (IaaS), Platform as a service (PaaS), and Software as a service (SaaS)\r\n
- Track 4-1Cloud Cryptography and Security
- Track 4-2Cloud Encryption and Crypto Management
- Track 4-3Potential Threats
- Track 4-4Importance of Crypto Cloud Computing
\r\n Cloud economic science may be a branch of data involved with the principles, prices and edges of cloud computing.\r\n
- Track 6-1What is cloud access control?
- Track 6-2What is cloud key management?
- Track 6-3What is identity access management in cloud computing?
- Track 6-4What is key management system?
- Track 6-5What is cloud kms?
- Track 6-6How does KMS server work?
- Track 6-7What is the difference between identity management and access management?
- Track 6-8What is key management life cycle?
\r\n Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G) collaborations, etc. There are many concerns about cloud computing especially in terms of security, privacy and trust. These main issues have prevented businesses from fully accepting cloud platforms. Cloud computing demands three primary security requirements: confidentiality, integrity, and availability. In this paper we discuss some these issues by reviewing a recently proposed model  that interestingly handles secure messaging among services deployed within the same cloud or on different clouds. Then, we report on our on-going work which is based on enhancing and developing this model. This is mainly achieved by adding a new service layer which is responsible for offering a high level of trust between collaborative parties. The added layer facilitates the integration of this model with the Public-Key Infrastructure (PKI). The main objective of the developed model is to increase the trust of the whole system by preventing any unauthorized party from joining the connectivity service. Indeed, our system can prevent any involved organization from launching masquerade attacks.\r\n
- Track 7-1What trusted cloud?
- Track 7-2What is Intruders in network security?
- Track 7-3What is trusted system and how do you implement trusted system?
- Track 7-4How does Trusted Platform Module work?
- Track 7-5What is root trust?
- Track 7-6What is TPM security?
- Track 7-7What are the characteristics of cloud computing?
- Track 7-8What is trusted system in network security?
- Track 7-9What does trusted computing mean?
- Track 7-10What is trusted content?
A cloud application, or cloud app, is a software program where cloud-based and local components work together. This model relies on remote servers for processing logic that is accessed through a web browser with a continual internet connection.
- Track 8-1Large Scale Cloud Application
- Track 8-2Innovative cloud applications and experiences
- Track 8-3Social, and mobile clouds
- Track 8-4Mobile services
\r\n While QoS properties have received constant attention well before the advent of cloud computing, performance heterogeneity and resource isolation mechanisms of cloud platforms have significantly complicated QoS analysis, prediction, and assurance. This is prompting several researchers to investigate automated QoS management methods that can leverage the high programmability of hardware and software resources in the cloud . This paper aims at supporting these efforts by providing a survey of the state of the art of QoS modeling approaches applicable to cloud computing and by describing their initial application to cloud resource management.\r\n
- Track 9-1Scope
- Track 9-2Methodology
- Track 9-3Survey Organization
- Track 9-4Workload Modelling
- Track 9-5System Modelling
- Track 9-6Application
\r\n Cloud computing represents a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” . Cloud computing is dynamically evolving, yet making significant impact in diverse areas of life. More enterprises are migrating to the cloud and new technological developments are taking place. Cloud computing offers several benefits to organizations, enterprises and small businesses alike. Most enterprises can reduce spending by leveraging on the infrastructure available on the cloud. Cloud services can be categorized in three primary ways. Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). SaaS offers the cloud user customized applications for use.\r\n
- Track 10-1Goals of Management and Optimization
- Track 10-2Optimization Architecture
\r\n Cloud computing is a novel technology in the field of distributed computing. Usage of Cloud computing is increasing rapidly day by day. In order to serve the customers and businesses satisfactorily, fault occurring in datacentres and servers must be detected and predicted efficiently in order to launch mechanisms to tolerate the failures occurred. Failure in one of the hosted datacentres may propagate to other datacentres and make the situation worse. In order to prevent such situations, one can predict a failure proliferating throughout the cloud computing system and launch mechanisms to deal with it proactively. One of the ways to predict failures is to train a machine to predict failure on the basis of messages or logs passed between various components of the cloud. In the training session, the machine can identify certain message patterns relating to failure of data centres. Later on, the machine can be used to check whether a certain group of message logs follow such patterns or not. Moreover, each cloud server can be defined by a state which indicates whether the cloud is running properly or is facing some failure. Parameters such as CPU usage, memory usage etc. can be maintained for each of the servers. Using this parameters, we can add a layer of detection wherein we develop a decision tree based on these parameters which can classify whether the passed in parameters to the decision tree indicate failure state or proper state.\r\n
- Track 12-1What is 5g cloud?
- Track 12-2What is MEC in 5g?
- Track 12-3What is edge cloud?
- Track 12-4What is 5g Internet?
- Track 12-5Is 5g important for IOT?
- Track 12-6What is SSC mode in 5g?
- Track 12-7What is Nef in 5g?
\r\n Cloud IoT Core supports two protocols for device connection and communication: MQTT and HTTP. Devices communicate with Cloud IoT Core across a "bridge" — either the MQTT bridge or the HTTP bridge. The MQTT/HTTP bridge is a central component of Cloud IoT Core, as shown in the components overview.When you create a device registry, you select protocols to enable: MQTT, HTTP, or both.\r\n
\r\n MQTT is a standard publish/subscribe protocol that is frequently used and supported by embedded devices, and is also common in machine-to-machine interactions.\r\n
\r\n HTTP is a "connectionless" protocol: with the HTTP bridge, devices do not maintain a connection to Cloud IoT Core. Instead, they send requests and receive responses. Cloud IoT Core supports HTTP 1.1 only (not 2.0).Both bridges use public key (asymmetric) device authentication and JSON Web Tokens (JWTs). For details, see the section on device security.\r\n
\r\n A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform. From a structural and design perspective, a cloud database is no different than one that operates on a business's own on-premises servers. The critical difference lies in where the database resides. Where an on-premises database is connected to local users through a corporation's internal local area network (LAN), a cloud database resides on servers and storage furnished by a cloud or database as a service (DBaaS) provider and it is accessed solely through the internet. To a software application, for example, a SQL database residing on-premises or in the cloud should appear identical. The behavior of the database should be the same whether accessed through direct queries, such as SQL statements, or through API calls. However, it may be possible to discern small differences in response time. An on-premises database, accessed with a LAN, is likely to provide a slightly faster response than a cloud-based database, which requires a round trip on the internet for each interaction with the database.\r\n
- Track 14-1Working Of Cloud Database
- Track 14-2Types of Cloud Databases
- Track 14-3Cloud database benefits
- Track 14-4Migrating legacy databases to the cloud
\r\n Security as a service (SecaaS or SaaS) is a cloud computing model that delivers managed security services over the internet. SecaaS is based on the software as a service (SaaS) model but limited to specialized information security services. SecaaS facilitates the provisioning of managed security services from the cloud, which benefits organizations in the following ways: Reduced costs: SecaaS solutions are provided on a monthly rental basis and per license purchased.\r\n
\r\n Ease of management: A service provider delivers total management of cloud security services, security policies, and general administration. Customizable and scalable services range from anti-virus/malware to outsourced security suite developers.\r\n
\r\n Continuous anti-virus updates: SecaaS services ensure that security software is maintained with the most current virus definition and security updates.\r\n
- Track 15-1BENEFITS OF SECURITY AS A SERVICE
- Track 15-2EXAMPLES OF SECURITY AS A SERVICE OFFERINGS
- Track 15-3WHAT TO LOOK FOR IN SECAAS PROVIDERS
\r\n Today, two mainstream technologies are the center of concern in IT – Big Data and Cloud Computing. Fundamentally different, Big data is all about dealing with the massive scale of data whereas Cloud computing is about infrastructure. However, the simplification offered by Big data and Cloud technology is the main reason for their huge enterprise adoption. For example Amazon “Elastic Map Reduce” demonstrates how the power of Cloud Elastic Computes is leveraged for Big Data processing.The combination of both yields beneficial outcome for the organizations. Not to mention, both the technologies are in the stage of evolution but their combination leverages scalable and cost-effective solution in big data analytics.So, can we say Big data and Cloud computing a perfect combination? Well, there are data points in support of it. Besides that, there are also some real-time challenges to deal with. In this blog, we will discuss both the aspects. We assume you have some idea and knowledge on Big data and Cloud computing.\r\n
- Track 16-1Big Data and Cloud Computing Relationship
- Track 16-2Cloud Computing Role for Big Data
- Track 16-3Relation between Big data and Cloud Computing
\r\n Businesses nowadays are seeking innovative ways to grow and accomplish their business goals. With the help of cloud computing, this business will keep on growing in the future. Cloud computing is powerful and expansive and will continue to grow in the future and provide many benefits. Cloud computing is extremely cost-effective and companies can use it for their growth. The future of cloud computing is bright and will provide benefits to both the host and the customer. One should keep in mind that the owner of the company should be familiar with the latest development taking place in Cloud technology.\r\n
\r\n Two fundamental technologies to enter into mainstream information technology are Big Data and cloud computing. Although these two are not the same; as Big Data represents content whereas cloud computing is infrastructure, the combination of both the technologies can yield excellent results. Thanks to cloud computing, Big Data can be processed on your computer systems and laptops quite comfortably. Let’s take a look at how exactly Big Data and cloud computing are compatible with each other and how beneficial are they for enterprises around the world.In order to understand why both the technologies are often bundled together, you need to have a basic understanding of what Big Data and cloud computing is.
\r\n The most straightforward definition of Big Data is that it’s a large volume of data- think terabyte or petabyte or even more than that. Data can be either structured or unstructured. This data can be so extensive that it cannot be processed through traditional database and software techniques. As for cloud computing, in the shortest term, it means storing and accessing data, files, and programs over the Internet instead of the local computer’s hard drive. The cloud is a metaphor for the Internet.
\r\n Through hardware virtualization, cloud computing provides the option of storing significant amounts of data with the help of scalability, fault tolerance and availability. This allows Big Data to be available, scalable and fault tolerant through cloud computing.
- Track 18-1Advantages of Big Data & Cloud computing
- Track 18-2Conclusion
\r\n For users, Cloud Computing is an operational technology in which computer/mobile/tablet users can store, calculate, arrange, manage, host, create, publish, delete, share, edit and manipulate remotely hosted system software and applications software’s, Data & Information by using the Internet.For services provider, it’s new stream of generating revenue from the same product through SAAS. And IAAS business model is a new way for all kind of businesses to replace in-house IT infrastructure with remotely installed infra. And for IT enterprises using PAAS cloud computing technology enable them to create, deploy API’s and manage and integrate solutions faster at the lower cost.
- \r\n Scalable Usage: \r\n
- \r\n Chatbots: \r\n
- \r\n Communication: \r\n
- \r\n Productivity: \r\n
- \r\n Business Process: \r\n
- \r\n Backup and recovery: \r\n
- \r\n Application development: \r\n
- \r\n Test and development: \r\n
- \r\n Big data analytics: \r\n
- \r\n Social Networking: \r\n
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
- Track 21-1Security issues associated with the cloud
- Track 21-2Cloud security controls
- Track 21-3Dimensions of cloud security
- Track 21-4Security and privacy
- Track 21-5Data security
- Track 22-1Hardware Virtualization:
- Track 22-2Operating System Virtualization:
- Track 22-3Server Virtualization
- Track 22-4Storage Virtualization
- Track 22-5Working of Virtualization in Cloud Computing
\r\n Nowadays, cloud computing and its services are at the top of the list of buzzwords in the IT world. It is a recent trend in IT that can be considered as a paradigm shift for providing IT & computing resources through the network. One of the best and most popular definitions of cloud computing is the NIST definition proposed in 2009 and updated in 2011. According to this definition, “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.\r\n
\r\n Recent advances in cloud computing are pushing virtualization more than ever. In other words, cloud computing services can be considered as a significant step towards realizing the utility computing concept.In such a computing model, services can be accessed by users regardless of where they are hosted or how they are delivered.\r\n
\r\n Over the years, computing trends such as cluster computing, grid computing, service-oriented computing and virtualization have gained maturity but cloud computing is still in infancy, and experiences lack of complete standards and solutions.\r\n
\r\n High Availability (HA) and reliability in cloud computing services are some of the hot challenges. The probability that a system is operational in a time interval without any failures is represented as the system reliability, whereas the availability of a system at time ‘t’ is referred to as the probability that the system is up and functional correctly at that instance in time.HA for cloud services is essential for maintaining customer’s confidence and preventing revenue losses due to service level agreement (SLA) violation penalties .In recent years, cloud computing environments have received significant attention from global business and government agencies for supporting critical mission systems . However, the lack of reliability and high availability of cloud services is quickly becoming a major issue . Research reports express that about $285 million have been lost yearly due to cloud service failures and offering availability of about 99.91%.\r\n
\r\n Cloud computing service outage can seriously impact workloads of enterprise systems and consumer data and applications. Amazon’s EC2 outage on April, 2011 is an example of one of the largest cloud disasters. Several days of Amazon cloud services unavailability resulted in data loss of several high profile sites and serious business issues for hundreds of IT managers.Furthermore, according to the CRN reports, the 10 biggest cloud service failure of 2017, including IBM’s cloud infrastructure failure on January 26, GitLab’s popular online code repository service outage on January 31, Facebook on February 24, Amazon Web Services on February 28, Microsoft Azure on March 16, Microsoft Office 365 on March 21 and etc., caused production data loss, and prevented customers from accessing their accounts, services, projects and critical data for very long and painful hours. In addition, credibility of cloud providers took a hit in these service failures and unavailability.\r\n
\r\n Edge computing is a distributed computing paradigm which brings computation and data storage clo The increase of IoT devices at the edge of the network is producing a massive amount of data to be computed to data centers, pushing network bandwidth requirements to the limit. Despite the improvements of network technology, data centers cannot guarantee acceptable transfer rates and response times, which could be a critical requirement for many applications.Furthermore devices at the edge constantly consume data coming from the cloud, forcing companies to build content delivery networks to decentralize data and service provisioning, leveraging physical proximity to the end user. In a similar way, the aim of Edge Computing is to move the computation away from data centers towards the edge of the network, exploiting smart objects, mobile phones or network gateways to perform tasks and provide services on behalf of the cloud. By moving services at the edge it is possible to provide content caching, service delivery, storage and IoT management, resulting in better response times and transfer rates. At the same time, distributing the logic in different network nodes introduces new issues and challenges.\r\n
- Track 24-1Privacy and security
- Track 24-2Scalability
- Track 24-3Reliability
- Track 24-4Applications
The Internet of things (IOT) is the network which is connected with devices which are embedded with electronics, software, sensors, and network connectivity. Thus it enables these objects to connect and exchange necessary data. IOT can identify each device uniquely through its embedded computing system. To take it to next level, IOT is integrated to cloud computing to expand its operations even further more.
- Track 25-1IOT cloud architectures & models
- Track 25-2IOT-cloud integration
- Track 25-3Cloud-based dynamic composition of IOT
- Track 25-4Cloud-based context-aware IOT
- Track 25-5IOT delivery models
- Track 25-6Resource management in IOT cloud environments
\r\n Cloud Computing architecture comprises of many cloud components, which are loosely coupled. We can broadly divide the cloud architecture into two parts:\r\n
\r\n Front End:\r\n
\r\n The front end refers to the client part of cloud computing system. It consists of interfaces and applications that are required to access the cloud computing platforms, Example - Web Browser.\r\n
\r\n Back End:\r\n
\r\n The back End refers to the cloud itself. It consists of all the resources required to provide cloud computing services. It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers, etc.\r\n
\r\n It is the responsibility of the back end to provide built-in security mechanism, traffic control and protocols.The server employs certain protocols known as middleware, which help the connected devices to communicate with each other.\r\n
\r\n Creation of a virtual machine over existing operating system and hardware is known as Hardware Virtualization. A Virtual machine provides an environment that is logically separated from the underlying hardware. The machine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as a Guest Machine\r\n
- Track 27-1Hardware Virtualization.
- Track 27-2Operating system Virtualization
- Track 27-3Server Virtualization
- Track 27-4Storage Virtualization
\r\n Serverless computing is a type of cloud computing where the customer does not have to provision servers for the back-end code to run on, but accesses services as they are needed. Instead, the cloud provider starts and stops a container platform as a service as requests come in and the provider bills accordingly.\r\n
\r\n Serverless computing is an approach to cloud computing where the customer simply makes requests of a container platform as a service (PaaS) and the provider starts and stops the PaaS as needed. The customer is freed from the need to rent, buy and configure servers beforehand. Serverless offerings include AWS Lambda and OpenWhisk.\r\n
\r\n The term is somewhat of a misnomer, as servers still run behind the scenes, but from the customer's point of view, the simply make requests, similar to going through an API. The concept is a logical outgrowth of the philosophy that cloud customers should pay for only what they need. Serverless computing appeals to customers who do not want to spend time or money provisioning servers. The disadvantage of the approach is that customers may experience latency, resource limits or performance problems.\r\n
- Track 28-1Serverless runtimes
- Track 28-2Serverless databases
- Track 28-3Advantages
- Track 28-4Disadvantages
\r\n Cloud elasticity refers to the ability of a cloud service to provide on-demand offerings, nimbly switching resources when demand goes up or down. It is often an immediate reaction to clients dropping or adding services in real time.Cloud elasticity is also known as rapid elasticity.Cloud elasticity is linked to various strategies such as resource pooling, multitenant storage and other ways that cloud providers use to provision their services. The idea is that the service should be able to quickly scale up or scale down according to an individual customer’s needs. Public cloud systems largely do this by having many clients on board at any given time and maintaining systems that can easily be re-provisioned to fit changing orders.IT experts make a distinction between cloud elasticity and cloud scalability. Having scalability or economy of scale means that the system can be built out feasibly from a smaller core. Elasticity on the other hand envisions a dynamic response to demand and supply volatility.Elasticity is the ability to grow or shrink infrastructure resources dynamically as needed to adapt to workload changes in an autonomic manner, maximizing the use of resources.This can result in savings in infrastructure costs overall. Not everyone can benefit from elastic services though. Environments that do not experience sudden or cyclical changes in demand may not benefit from the cost savings elastic services offer. Use of “Elastic Services” generally implies all resources in the infrastructure be elastic. This includes but not limited to hardware, software, QoS and other policies, connectivity, and other resources that are used in elastic applications. This may become a negative trait where performance of certain applications must have guaranteed performance. It depends on the environment.\r\n
- Track 29-1Cloud Scalability
- Track 29-2Where Elasticity and Scalability Cross Paths
- Track 29-3Scalability vs. Elasticity
\r\n Storage virtualization in Cloud Computing is nothing but the sharing of physical storage into multiple storage devices which further appears to be a single storage device. It can be also called as a group of an available storage device which simply manages from a central console. This virtualization provides numerous benefits such as easy backup, achieving, and recovery of the data.This whole process requires very less time and works in an efficient manner. Storage virtualization in Cloud Computing does not show the actual complexity of the Storage Area Network (SAN). This virtualization is applicable to all levels of SAN.\r\n
- Track 30-1Implementation of Storage Virtualization
- Track 30-2Types of Storage Virtualization
- Track 30-3Storage Virtualization Risks
- Track 30-4Methods of Storage Virtualization
- Track 30-5Importance Of storage Virtualization
- Track 30-6Application of Storage Virtualization
- Track 30-7Advantages of Storage Virtualization
- Track 30-8Centralized Management
- Track 31-1Goal of Green Computing
- Track 31-2Green Cloud Computing – A Data Centre
- Track 31-3Green Use
- Track 31-4Green disposal
- Track 31-5Green design
- Track 31-6Green manufacturing
Cloud computing is usually described in one of two ways. Either based on the deployment model, or on the service that the cloud is offering. The cloud deployment model is public, private, hybrid community cloud. The cloud service model comes under four types as SaaS (Software-as-a-Service).Previously, we have explained how cloud works. Basically, programs that are needed to run a certain application are now more popularly located on a remote machine, owned by another company. This is done in order not to lose on the quality performance due to processing power of your own computer, to save money on IT support, and yet remain advantageous on the market. These computers that run the applications, store the data, and use a server system, are basically what we call “the cloud”.
- Track 33-1Deployment Cloud Model
- Track 33-2Service Cloud Model
Cloud load balancing is a type of load balancing that is performed in cloud computing. Cloud load balancing is the process of distributing workloads across multiple computing resources. Cloud load balancing reduces costs associated with document management systems and maximizes availability of resources. It is a type of load balancing and not to be confused with Domain Name System (DNS) load balancing. While DNS load balancing uses software or hardware to perform the function,cloud load balancing uses services offered by various computer network companies.
- Track 34-1Comparison With DNS Load Balancing
- Track 34-2Importance of Load Balancing
- Track 34-3Load Balancing Techniques
- Track 34-4Client-side Load Balancer Using Cloud Computing